Research Article Asymptotic Distribution of Isolated Nodes in Secure Wireless Sensor Networks under Transmission Constraints

Size: px
Start display at page:

Download "Research Article Asymptotic Distribution of Isolated Nodes in Secure Wireless Sensor Networks under Transmission Constraints"

Transcription

1 Discrete Dynamics in Nature and Society Volume 16, Article ID , 1 pages Research Article Asymptotic Distribution of Isolated Nodes in Secure Wireless Sensor Networks under Transmission Constraints Y. Tang 1 and Q. L. Li 1 College of Culture and Communication, Changsha Social Work College, Changsha 4119, China College of Mathematics and Computer Science, Hunan Normal University, Changsha 4181, China Correspondence should be addressed to Y. Tang; cstangyan@16.com Received 18 December 15; Revised 5 May 16; Accepted 6 June 16 Academic Editor: Gabriella Bretti Copyright 16 Y. Tang and Q. L. Li. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The Eschenauer-Gligor (EG) key predistribution is regarded as a typical approach to secure communication in wireless sensor networks (WSNs). In this paper, we establish asymptotic results about the distribution of isolated nodes and the vanishing small impact of the boundary effect on the number of isolated nodes in WSNs with the EG scheme under transmission constraints. In such networks, nodes are distributed either Poissonly or uniformly over a unit square. The results reported here strengthen recent work by Yi et al. 1. Introduction A wireless sensoetwork is composed of a collection of wireless sensors distributed over a geographic region. A wireless sensoetwork can be an integral part of military command, control, communication, computing, intelligence, surveillance, reconnaissance, and target system. It has been the subject of intense research in recent decades. Asymptotic analysis, valid when the number of nodes in the network is large enough, has been useful for understanding the characteristic of the network. In many applications, a large number of wireless sensors are independently and uniformly deployed in the sensor field. They can be deployed by dropping from a plane or delivered in a missile. To model such a randomly deployed wireless sensoetwork, it is natural to represent the sensoodes by a finite random point process over a network square area S. In addition, due to the short transmission range of communication links, two wireless sensors can build a link if and only if they are within each other s transmission range. Assume all n sensors have the same transmission range of radius, then the induced network topology is a -disk graph in which two nodes are joined by an edge if and only if their distance is at most.thismodelisproposedbygilbert [1] and referred to as a random geometric graph, denoted by G(n,, S). However, in many applications, a wireless sensoetwork is composed of low cost sensors. Due to the ited capacity, traditional security schemes and key management algorithms aretoocomplicatedandnotfeasibleforsuchasystem.the Eschenauer-Gligor (EG) [] key predistribution scheme is a widely recognized way to secure communication. In this scheme,inawsnwithn sensors and sensor set V = {V 1, V,...,V n }, the EG scheme independently assigns a set of K n distinct cryptographic keys, which are selected uniformly at random from a pool of P n keys, to each sensoode; the set of keys of each sensor is called the key ring and is denoted by S x for sensor V x. The EG scheme is denoted by a random key graph G(n, K n,p n ) in [3 6], in which an edge exists between two nodes V x and V y if and only if they possess at least one common key; that is, S x S y =. In a WSN using the EG scheme under transmission constraint, two sensors V x and V y establish a direct link betweenthemifandonlyiftheyshareatleastonekey and their distance is no greater than. We denote the event establishing this direct link by E xy.ifweletthegraph G(n, θ n, S) model such a WSN, it is obvious to see G(n, θ n, S) is the intersection of random key graph G(n, K n,p n ) and

2 Discrete Dynamics in Nature and Society random geometric graph G(n,, S) with n nodes uniformly distributed over a square S;namely, G (n, θ n, S) =G(n, K n,p n ) G(n,, S), (1) where θ n represents the parameters K n,p n,and together. Let V x S be the location of point V x.adirectlinke xy exists in G(n, θ n, S) if both of the following two conditions are satisfied: V x V y ; S x S y =, where represents the Euclidean norm. We let p s be the probability of key sharing between two sensors and note that p s isalsotheedgeprobabilityinrandom key graph G(n, K n,p n ).Itholdsthat p s = P (S x S y () =). (3) Clearly if P n <K n,thenp s =1.IfP n K n,asshownin previous work [5 7], we have p s =1 ( P n K n K n ) ( P n K n ). (4) If P n K n,by[8],itfurtherholdsthat p s K n P n. (5) By [9], (5) implies that if K n /P n = o(1),then p s = K n (1 O( K n )) K n. (6) P n P n P n Wewilluse(5)and(6)throughoutthepaper. Let p e be the probability that a secure link exists between two sensors in the WSN with EG scheme under practical constraint; obviously, p e is the edge probability in G(n, θ n, S). It holds that p e = P[E xy ].Itissimplemattertoshowp e πr n p s and p e (1 ) πr n p s,if = o(1), p e πr n p s. Therefore if = o(1) and K n /P n = o(1), weget p e πr n K n /P n in view of (6). The secure wireless sensoetwork with nodes uniformly distributed is modeled by graph G(n, θ n, S), inwhichtwo nodes have an edge if their Euclidean distance is at most andhaveasecurelinkiftheirkeyringshaveatleastone common key. Compared to the work done by Yi et al. [1], in this paper, by using a different method, we establish that the number of isolated nodes in the secure wireless sensor network has an asymptotic Poisson distribution whether the n nodes are induced by a uniform point process or Poisson point process. To model transmission constraints, we use the popular disk model [11], and under the disk model, two nodes are directly connected if and only if their Euclidean distance is smaller or equal to a given threshold,whereparameter is termed as the transmission range. The following notations are used throughout the paper: (i) a(n) = o(b(n)) if n (a(n)/b(n)) ; (ii) a(n) = ω(b(n)) if n (b(n)/a(n)) ; (iii) a(n) b(n) if n (a(n)/b(n)) 1; (iv) a(n) = Θ(b(n)) if there exist sufficiently n and c 1,c > such that, for any n>n, c 1 b(n) a(n) c b(n); (v) a(n) = Ω(b(n)) if there exist sufficiently n and C> such that, for any n>n, a(n) Cb(n); (vi) the notation ln stands for the natural logarithm function. The rest of the paper is organized as follows. Section reviews related work. Section 3 comparatively studies the distribution of isolated nodes in WSNs employing the EG scheme with nodes Poissonly or uniformly distributed over a unit square S. Through the study, it shows that under certain conditions the impact of boundary effect on the number of isolated nodes is negligible. Finally, Section 4 summarizes conclusions and discusses prospects of establishing the distribution of isolated nodes and tighter connectivity thresholds for secure wireless sensoetworks under improved conditions.. Related Work With regard to the sensor distribution, we consider that n nodes are independently and uniformly deployed in unit square area S. The disk model induces a random geometric graph [4, 1 15] which is denoted by G(n,, S); anedge exists between two sensors if and only if their Euclidean distance is no more than. Extensive research has been done on random geometric graphs. The connectivity of random geometric graphs has been studied by Dette and Henze [16], Penrose[17],andothers[1,18 ].Forauniformn point process over a unit area square S, Dette and Henze [16] showed that, for any constant c, if = (ln n+c)/πn,then graph G(n,, S) has no isolated nodes with probability e c asymptotically. Eight years later, Penrose [14] established that if a random geometric graph induced by a uniform point process or Poisson point process has no isolated nodes, then it is almost surely connected. Besides the overall connectivity, some applications are concerned with whether there exists a giant connected component. Continuum percolation is a useful theorem in analyzing threshold phenomena. AmmariandDas[1]focusedonpercolationincoverage and connectivity in three-dimensional space and found out whether the network provides long distance multihop communication. For random key graph G(n, K n,p n ), Godehardt and Jaworshi[]focusedonthedistributionofthenumber of isolated vertices in G(n, K n,p n ). Some partial results concerning the connectivity of random key graphs were given in [6, 7, 3]. In [5], Rybarczyk gave asymptotic tight bounds for the thresholds of the connectivity, phase transition, and diameter of the largest connected component in random key graphs for all ranges of K n.otherrelated works regarding G(n, K n,p n ) model have been reported.

3 Discrete Dynamics in Nature and Society 3 For example, Bloznelis et al. [4] treated the evolution of the order of the largest component. Connectivity and communication security aspects of G(n, K n,p n ) in various important settings are also studied in [7, 5, 6]. Although some properties of secure WSNs with the EG scheme have been extensively studied in [4 7, 13, 7], most research [5 7, 7] unrealistically assumes unconstrained sensor-to-sensor communications; that is to say, any two sensors can communicate regardless of the distance between them. Recently, there is interest in random graphs in which an edge is determined by more than one random property, that is, intersection of different random graphs. The intersection of Erdős-Rényi random graph G(n, p) [8] and random geometric graph G(n,, S) has been of interest for quite some time now. Recent work on such random graphs is by [, 9] where connectivity properties and the distribution of isolated nodes are analyzed. And the intersection of random graphs G(n, p) and random key graph G(n, K n,p n ) is considered in [3]. Such a graph is constructed as follows: arandomkeygraphg(n, K n,p n ) is first formed based on the key distribution and each edge in this graph is deleted with a specified probability. The intersection of random key graph G(n, K n,p n ) and random geometric graph G(n,, S) (i.e., G(n, θ n, S)) isfirst studied in [31]. Di Pietro et al. [31] have shown that, under the scaling πr n (K n /P n) = c(ln n/n), the one law that this classofrandomgraphsisconnectedfollowsif > and c > π. Anotheotable work is due to Krzywdziński and Rybarczyk [13], where the authors have improved this result and established that, in G(n, θ n, S), ifπr n (K n /P n) = 8(ln n/n) with K n >, P n = ω(1), andwithoutany constraint on,theng(n, θ n, S) is almost surely connected. AndKrishnanetal.[4]demonstratedthatifπr n (K n /P n) π(ln n/n) with K n = ω(1) and (K n /P n) = o(1), then G(n, θ n, S) is almost surely connected. Recently, Tang and Li[3]andZhaoetal.[33]presentedthefirstzero-one laws for connectivity in G(n, θ n, S); these laws improve theresults[4,13]significantlyandhelpspecifythecritical transmission ranges for connectivity. Also the distribution of isolated nodes in G(n, θ n, S) is considered by Yi et al. [1] andpishro-niketal.[34],wherethenetworkwithn nodes distributed uniformly over a unit disk D or a unit square S. In addition to random key graphs and random geometric graphs, the Erdös-Rényi graph G(n, p) [8] has also been extensively studied. An Erdös-Rényigraph G(n, p) is defined on a set of n nodes such that any two nodes establish an edge independently with probability p. Asalreadyshown in the literature [5 7, 7], random key graph G(n, K n,p n ) and Erdös-Rényi graph G(n, p) have similar connectivity properties when they are matched through edge probability; that is, p s = p. Hence, it would be tempting to exploit this analogue and conclude that the distribution of isolated nodes in G(n, θ n, S) (G(n,K n,p n ) G(n,, S)) is similar to that of G(n, p) G(n,, S) in [], whether the n nodes are distributed Poissonly or uniformly on a unit square S. 3. Main Result In this section, we study the expected number of isolated nodes in WSNs with the EG scheme under transmission constraints with nodes either Poissonly or uniformly on a unit square S. The number of isolated nodes is a key parameter in the analysis of network connectivity. A necessary condition for a network to be connected is that the network has no isolated nodes, and this may be possibly true for the intersection of random key graph and random geometric graph. In order to obtain the distribution of isolated nodes in G(n, θ n, S), we prove the same result for its Poissonized version, graph G Poisson (n, θ n, S), where the only difference between G Poisson (n, θ n, S) and G(n, θ n, S) is that the node distribution of the former is a homogeneous Poisson point process with intensity n on a unit square S whilethatofthe latter is a uniform n point process Expected Number of Isolated Nodes in G Poisson (n, θ n, S). In graph G Poisson (n, θ n, S),letI x denote the event that node V x is isolated, and let D rn ( V x ) denote the intersection of S and the disk centered at position V x S with radius.whennode V x is at position V x, the number of nodes within area D rn ( V x ) follows a Poisson distribution with mean nd rn ( V x ),andto have an edge with V x in graph G Poisson (n, θ n, S), a node not only has to be within D rn ( V x ) butalsohastoshareatleastakey with node V x. Then the number of nodes neighboring to V x at V x follows a Poisson distribution with mean np s D rn ( V x ),and the probability that such number is is equal to e np s D ( V x). Integrating V x over S, then the probability that the node V x is isolated is given by P (I x )= S. (7) Theorem 1. Suppose that K n /P n = o(1), p s = ω(1/ ln n), and n nodes are Poissonly distributed on a unit square S with the maximum transmission radius πr n K n /P n =(ln n+c)/nfor some constant c. Then the expected number of isolated nodes in G Poisson (n, θ n, S) converges asymptotically to e c as n. Proof. Let W denote the number of isolated nodes in graph G Poisson (n, θ n, S).By(7),weknowP(I x )= S holds. To compute P(I x ) based on S, wedivides in a way similar to that by Li et al. [35] and Wan and Yi [15]. Specially, S is divided into S, S 1, S,andS 3,respectively,as illustrated in Figure 1 (note that = o(1)). S consists of all points each with a distance greater than to its nearest edge to S,whereasS 3 is a square of size at the four corners of S. We further divide S\{S S 3 } into S 1 and S as follows. In S\{S S 3 }, S 1 contains points whose distance to the nearest edge of S is no greater than /, while the remaining area is S. Then the expected number of isolated nodes is given by E (W) = np (I n n x)= n e n S np s D ( V x) d V x = n n S

4 4 Discrete Dynamics in Nature and Society 1 Since S 1 consists of four retangles, each of which has length 1 and width /,itfollowsthat 1 S 3 S S 1 S S S 1 S S 1 S 3 n n S 1 =4n(1 ) / n For simplicity, we write H(g) as H.Then e np sh(g) dg. (13) S e np sh(g) dg = (np s ) 1 (H ) 1 de np sh = (np s ) 1 S 3 S r 3 n S 1 {d[(h ) 1 e np sh ] e np sh d(h ) 1 }=(np s ) 1 (14) {d[ (H ) 1 e np sh ] (H ) H e np sh dg}. Figure 1: The unit square S and its divisions S, S 1, S,andS 3. + n n S 1 In view of (14), we further have (H ) H e np sh dg = (H ) 3 H e np sh dh = (np s ) 1 (H ) 3 H d( e np sh ). (15) + n n S + n e np s D ( V x) rn d V n x. S 3 (8) The four summands in (8) represent, respectively, the expected number of isolated nodes in the central area S,in the boundary area along the four sides of S, andinthefour corners of S. In the following analysis, we will show that the first term approaches e c as n,andtheremainingterms approach an n. Consider the first summand in (8). It is clear that, for any position V x S,wehave D rn ( V x ) = πr n, and note that πr n (K n /P n)=(ln n+c)/n, S = (1 ) to get n e np s D ( V x) d V n x = n e np sπ d V S n x S = n ne np sπr n S d V x = n e c (1 ) =e c. For the second term in (8), we introduce some notation as follows. For any position V x S 1, we let the distance from V x to the nearest edge of square S be g,where g /.For V x S 1,clearly D rn ( V x ) is determined by g, and we denote it by H(g).Itiseasytoobtain H(g)= D ( V x ) =πr n r n arccos g +g r n g, (9) (1) H (g) = r n g, (11) H g (g) =. rn g (1) For g /, it holds from (11) and (1) that H (H ) 3 = g 4(rn g ) / 4 ((3/4) r = n ) 9rn 3. (16) By (15) and (16), it follows that / (H ) H e npsh dg (17) rn/ 9rn 3p sn d( e npsh ). Applying (17) into (14), / e npsh(g) dg = 1 / ( d[ (H ) 1 e npsh ] np s / (H ) H e npsh dg) 1 / ( d[ (H ) 1 e npsh ] np s rn/ + 9rn 3p sn + e np sh() 9r 3 n p s n. d[ e np sh ]) e np sh() np s H () (18) From (1) and (11), we obtain H() = πr n / and H () =. Consider / e npsh(g) dg e np sh() np s H () + e npsh() 9rn 3p s n = e np s(πrn /) np s + e nps(π /) 9rn 3. p s n (19)

5 Discrete Dynamics in Nature and Society 5 Using πr n (K n /P n)=(ln n+c)/nand (6) in (19), we derive / Using () in (13), we get e npsh(g) dg e np s(πrn /) (1+o(1)). () np s n n S 1 =4n(1 ) 4n / n e nps(πr n /) n e np sh(g) dg np s (1+o(1)). (1) From K n /P n = o(1), p s = ω(1/ ln n), andwithδ denoting πr n p sn (note that Δ=Θ(ln n)), We obtain =π 1/ p 1/ s n 1/ Δ 1/. () n n S 1 =. (3) Now we consider n n S.For V x S, when the distance from V x to the nearest edge of square S is g,where / g, the function expression of D rn ( V x ) still is H(g). H(g) is increasing with g for / g by H (g) = rn g. Thus, when the distance from V x to the nearest edge of S equals /, thearea D rn ( V x ) reaches its minimum value: D ( V x ) min =H( )=( π )πr n. (4) With C denoting /3 + 3/4π, then D rn ( V x ) min =C πr n. And with S = (1 ), we derive n e np s D ( V x) d V n x n e np sc π d V S n x S = n ne np sc πr n S d V x n ne np sc πr n. From p s = ω(1/ ln n), Δ=Θ(ln n),and(),itfollows (5) n n S =. (6) For the last term in (8), we have (1/4)πr n D ( V x ) πr n for any V x S 3 and S 3 =4r n to get n e np s D ( V x) d V n x n e (1/4)np sπ d V S n x 3 S 3 = n ne (1/4)np sπr n S 3 d V x = n 4nr n n 1/4 e (1/4)np sπr n =, (7) where (), Δ = Θ(ln n), andp s = ω(1/ ln n) are used in reaching (7). As a result of (8),(9), (3), (6), and (7), we prove n =e c. (8) The parameter c in Theorem 1 is a constant, or it can depend on n, inwhichcasec = o(ln n). Thefollowing corollary can be established. Corollary. In graph G Poisson (n, θ n, S) under conditions K n /P n = o(1), p s = ω(1/ ln n),andπr n (K n /P n)=(ln n+c)/n with c=o(ln n) or a constant c, then for any constant ε> such that E(W) = o(n ε ) holds. Now we examine the impact of boundary effect on the number of isolated nodes in G Poisson (n, θ n, S) since the network area in our analysis is a square. The square accounts for the real-world boundary effect whereby some transmission region of a sensor close to the network boundary may fall outside the network field. In contrast, the torus einates the boundary effect. The analysis of impact of the boundary effectisdonebycomparingthenumberofisolatednodesin G Poisson (n, θ n, S) and the number in a network with nodes Poissonly distributed on a unit torus S T with a pair of nodes V x, V y separated by a toroidal distance V x V y T.Denotesuch network on a unit torus by G T Poisson (n, θ n, S T ).Thefollowing Theorem can be established. Theorem 3. Suppose that K n /P n = o(1), p s = ω(1/ ln n),and n nodes are Poissonly distributed on a unit torus S T with the maximum transmission radius πr n (K n /P n)=(ln n+c)/nfor some constant c. Then the expected number of isolated nodes in G T Poisson (n, θ n, S T ) converges to e c as n. Proof. Let W T denote the number of isolated nodes in graph G T Poisson (n, θ n, S T ), and let D T ( V x ) denote the intersection of S T and the disk centered at position V x S T with radius.theprobabilitythatnodev x is isolated is P(I T x )= S T e np s D T rn ( V x) d V x.sinces T isaunittorus,itholdsthat D T ( V x ) = πr n for any V x S T.Then P (I T x )= S T e np s D T rn ( V x) d V x =e πr n p sn S T d V x =e πr n p sn ST =e πr n p sn. Using the condition πr n (K n /P n)=(ln n+c)/n,weobtain (9) n E(WT )= np (I T n x )= n ne πr n psn =e c. (3) OnthebasisofTheorems1and3,usingthecoupling technique, the following theorem can be obtained. Theorem 4. Suppose that K n /P n = o(1), p s = ω(1/ ln n), and n nodes are Poissonly distributed on a unit square S

6 6 Discrete Dynamics in Nature and Society with the maximum transmission radius πr n (K n /P n) = (ln n+c)/nfor some constant c. Thenthenumberofisolated nodes in G Poisson (n, θ n, S) due to the boundary effect converges asymptotically to as n. Proof. Comparing Theorems 1 and 3, it is noted that the expected numbers of isolated nodes on a unit torus S T and on a unit square S, respectively, asymptotically converge tothesameconstante c as n.nowweusethe coupling technique [36] to construct the connection between W and W T. Consider a graph G T Poisson (n, θ n, S T ),andthe number of isolated nodes in that graph is W T.Remove each connection of the above graph with probability 1 D rn ( V x ) / D T ( V x ), independently of the event that another connection is removed. Due to D rn ( V x ) D T ( V x ), then 1 D rn ( V x ) / D T ( V x ) 1. We furtheote that only connections between nodes near the boundary will be affected. Denote the number of newly appearing isolated nodes by W E ;namely,w E is the number of isolated nodes due to the boundary effect; it is straightforward to show that W E is a nonnegative random integer. Further, such a connection removal process results in a random network with nodes Poissonly distributed with density n.thatis,arandom network on a unit square with boundary effect is included. The following equation result holds: W=W E +W T. (31) By Theorems 1 and 3 and the above equation, it can be shown that n E (WE ) = n E (W W T ) =. (3) Due to the nonnegativity of W E, n P (WE =)=1. (33) 3.. Distribution of the Number of Isolated Nodes in G Poisson (n, θ n, S). In this subsection, we analyze the distribution of the number of isolated nodes in G Poisson (n, θ n, S). For this purpose, we give some definitions. Let Poi(λ) be a Poisson random variable with parameter λ. Let Γ beafinitesetofindicesandlet(i a ) a Γ be a family of random indicator variables. We say (I a ) a Γ are positively related(see[37]), if, for each a Γ, there exist random indicator variables (J ba ) b Γ\{a} with the distributions L ((J ba ) b Γ\{a} )=L ((I b ) b Γ\{a} I a =1), (34) such that J ba I b for every b =a. A useful result obtained by Stein-Chen method is the following. Lemma 5 (see [37, 38]). Suppose that Y = a Γ I a,where the indicator variables (I a ) a Γ are positively related random indicator variables. Then one has d TV (Y, Poi (EY)) 1 e EY EY (Var Y EY+ (EI a ) ). a Γ (35) For x = 1,...,n,letI T x = 1 if node V x is isolated in G T Poisson (n, θ n, S T ) and W T = n x=1 IT x. Therefore, WT is the number of isolated nodes in G T Poisson (n, θ n, S T ) as defined in Theorem 3. We will demonstrate the asymptotic Poisson distribution of W T by employing the Stein-Chen method [37]. The result is given in Theorem 6. Theorem 6. Suppose K n ln n/ ln ln n, K n /P n = o(1), p s = ω(1/ ln n),andn nodes are Poissonly distributed on a unit torus S T with the maximum transmission radius πr n (K n /P n)= (ln n+c)/nfor some constant c. Then the distribution of the number of isolated nodes in G T Poisson (n, θ n, S T ) converges to a Poisson distribution with mean e c as n. Proof. The triangular inequality for the total variation distance implies d TV (W T, Poi (e c )) d TV (W T, Poi (EW T )) +d TV (Poi (EW T ),Poi (e c )). By a coupling argument [39] and Theorem 3, we have (36) d TV (Poi (EW T ),Poi (e c )) EWT e c =o(1). (37) Combining this with (36), we now only need to prove n d TV (W T, Poi (EW T )) =. (38) First, we claim that (I T x )n x=1 are positively related. To see this, define I T yx =1 if node V y is isolated in G T Poisson (n, θ n, ST 1 ), (39) where G T Poisson (n, θ n, ST 1 ) is a graph with P n \ S x or S T 1 = ST \ D T ( V x ) compared to G T Poisson (n, θ n, S T ),wheres x represents the key ring which is adjacent to V x in G T Poisson (n, θ n, S T ). Conditional on the isolation of node V x in G T Poisson (n, θ n, S T ), any node V y is not adjacent to S x or V y S T \D T ( V x ) in G T Poisson (n, θ n, S T ).Hence,wehave L ((I T yx )n )=L y=1,y=x ((IT y )n y=1,y=x IT x =1). (4) For every y =x,ifi T y =1then IT yx =1.Consequently,weget I T yx IT y.

7 Discrete Dynamics in Nature and Society 7 By Lemma 5, the binary nature, and exchangeability of the random variables involved, we find that d TV (W T, Poi (EW T )) T 1 e EW EW T (Var W T EW T + (EI T x ) ) n x=1 1 EW T (Var WT EW T + (EI T x ) ) n x=1 1 EW T (n (n 1) E(IT x IT y ) n(n ) (EIT x ) ). (41) The cross term E(I T x IT y ) in (41) is given by [33], and we have E(I T x IT y ) (1 4πr n )e πr n p sn (4) +4πr n e πr n psn e πr n n(k4 /P n )+(K n /(P n K n ))e πr n n(k n/pn). With F(n) denoting e πr n n(k4 n /P n )+(K n /(P n K n ))e πr n n(k n/pn),combining (9), (41), and (4) readily gives d TV (W T, Poi (EW T )) n[(n 1) e πr n psn (1 + 4πr n F (n)) (n ) e πr n psn ] ne πr n p sn ne π psn (1 + 4nπr nf (n)) ne πr n p sn e πr n psn (1 + 4nπr nf (n)) =o(1), (43) where K n ln n/ ln ln n, K n /P n = o(1), p s = ω(1/ ln n) πr n (K n /P n)=(ln n+c)/n,and()areusedinreaching(43), along with (36), (37), and (43), which concludes the proof. We now consider the asymptotic distribution of the number of isolated nodes in G Poisson (n, θ n, S). From Theorem 4, n P(W E =)=1holds, and using Slutsky s Theorem [4], the following result on the asymptotic distribution of W canbereadilyobtained. Theorem 7. Suppose K n ln n/ ln ln n, K n /P n = o(1), p s = ω(1/ ln n), andn nodes are Poissonly distributed on a unit square S with the maximum transmission radius πr n (K n /P n) = (ln n + c)/n for some constant c. Then the distribution of the number of isolated nodes in G Poisson (n, θ n, S) converges to a Poisson distribution with mean e c as n Distribution of the Number of Isolated Nodes in G(n, θ n, S). We derive the distribution of isolated nodes in G(n, θ n, S) by using standard Poissonization technique [11, 14]. The idea is that the result about the distribution of isolated nodes for G(n, θ n, S) follows once we establish the resultwithpoissonization,thatistosay,onceweobtainthe distribution of isolated nodes for G Poisson (n, θ n, S). Seethe following lemma for rigorous argument. Lemma 8. Suppose that K n /P n = o(1), p s = ω(1/ ln n), and n nodes have the same maximum transmission radius πr n (K n /P n)=(ln n+c)/nfor some constant c. Thenwith m denoting n n 1/+c,wherec is an arbitrary constant with <c <1/, then node V i is isolated in G(n, θ n, S) if and only if V i is an isolated node in G Poisson (m, θ n, S). Proof. We will use the standard de-poissonization technique [11, 14, 18] to prove Lemma 8. Let M denote the number of nodes in graph G Poisson (m, θ n, S); clearlym follows a Poisson distribution with mean m, for any positive t, and from Chebyshev s inequality, we have P ( M m t m) t. (44) Without loss of generality, we take n n 1/+c as an integer. With t = (n m)/ m,substitutingm=n n 1/+c into (46), we get P (M n n 1/+c or M n) n n1/+c =o(1). n 1+c (45) Hence, n n 1/+c <M<nholds almost surely. When M<n,weconstructacouplingC between graph G(n, θ n, S) and graph G Poisson (m, θ n, S);letgraphG(n, θ n, S) be the result of adding n Mnodes uniformly distributed on S to graph G Poisson (m, θ n, S). LetV P be the node set of G Poisson (m, θ n, S); clearly, V P is a subset of V, wherevis the node set of G(n, θ n, S). In addition, it is straightforward to see that the edge set of G Poisson (m, θ n, S) is also a subset of that of G(n, θ n, S). Then under coupling C,graphG Poisson (m, θ n, S) is a subgraph of G(n, θ n, S). Let D X,D P denote the set of isolated nodes in G(n, θ n, S) and G Poisson (m, θ n, S), respectively. To prove Lemma 8, we show P (D X It is straightforward to see P (D X =D P ) P [(D P \D X =D P )=o(1). (46) =) (n n 1/+c + P [(D X \D P =) (n n 1/+c + P (M n n 1/+c or M n). (47)

8 8 Discrete Dynamics in Nature and Society By (47), we will prove P(D X P [(D P \D X =o(1), P [(D X \D P =o(1). =D P ) = o(1) if we can derive =) (n n 1/+c =) (n n 1/+c (48) (49) To prove (48) and (49), with n n 1/+c <M<n, we consider the coupling C under which G Poisson (m, θ n, S) is a subgraph of G(n, θ n, S). First, we consider (48) with n n 1/+c <M<n;event D P \D X =happens if and only if there exists at least one node V i such that V i D P and V i D X ;thatistosay,v i is isolated in G Poisson (m, θ n, S) but is not isolated in G(n, θ n, S). Then there exists at least one node V in V\V P such that V and V i are neighbors in G(n, θ n, S). Dueto V \ V P = n M < n 1/+c,notingthatp e is the edge probability in G(n, θ n, S), thenwithw P denoting the number of isolated nodes in G Poisson (m, θ n, S), as an easy consequence of the union bound, P [(D P \D X W P n 1/+c p e. =) (n n 1/+c (5) In order to apply Corollary to G Poisson (m, θ n, S), forn sufficiently large, the following condition holds: πr n K n = P n We demonstrate (51) in view of ln m+c m. (51) m πr n K n ln n+c (ln m+c) =m (ln m+c) P n n =(n n 1/+c ln n+c ) (ln (n n 1/+c )+c) n =(1 n c 1/ ) (ln n+c) ln n ln (1 n c 1/ ) c=o(1), (5) where < c < 1/. And sufficiently large n areusedin the final step. Then with (51), for any constant ε>,weuse Corollary to get W P =o(m ε )=o(n ε ). (53) Note that p e πr n p s,andπr n (K n /P n)=((ln n+c)/n). Then from (5), with ε satisfying <ε<1/ c,itfollows that P [(D P \D X o(n ε ) n 1/+c =) (n n 1/+c ln n+c n =o(1). (54) Second, in order to prove (49) with n n 1/+c <M<n, we consider event that D X \D P =occurs if and only if there exists at least one node V j such that V j D X and V j D P. With V j D X,thenV j is isolated in G(n, θ n, S),whichalong with V j D P leads to V j V P and V j V\V P.Letqdenote the probability that a node is isolated in G(n, θ n, S);itfollows via a union bound that P [(D X \D P n 1/+c q. =) (n n 1/+c (55) Since q = S, according to the proof of Theorem 1, it is easy to show q = Θ(ln n/n). Withq = Θ(ln n/n) and <c <1/,then P [(D X \D P =o(1). =) (n n 1/+c (56) In conclusion, since P(D X =) P(D P = ) P(D X = D P ), the above discussions lead to establish Lemma 8. Applying Theorem 7 and Lemma 8, we get the following theorem. Theorem 9. Suppose K n ln n/ ln ln n, K n /P n = o(1), p s = ω(1/ ln n), and n nodes are uniformly distributed on a unit square S with the maximum transmission radius πr n (K n /P n) = (ln n+c)/nfor some constant c. Thenthe distribution of the number of isolated nodes in G(n, θ n, S) converges to a Poisson distribution with mean e c as n. Noting that the number of isolated nodes in a network is a nonnegative integer, the following result can be obtained as a consequence of Theorems 7 and 9. Notice that, in formulating this result, we drop the assumption that c originally is a constantandallowitinsteadtoben-dependent. Corollary 1. Suppose K n /P n = o(1), p s = ω(1/ ln n), andn nodes are Poissonly (uniformly) distributed on a unit square S with the maximum transmission radius πr n (K n /P n) = (ln n+c n )/n for some c n. A necessary condition for graph G Poisson (n, θ n, S)(G(n, θ n, S)) to be asymptotically connected is c n. 4. Conclusion and Future Work Yi et al. [1] considered that a wireless ad hoc network consists of n nodes distributed independently and uniformly in a unit disk D or a unit square S. They used Brun s sieve to show that, for graph G(n, θ n, D) or G(n, θ n, S),ifπr n (K n /P n)=(ln n+ c)/n and K n /P n = ω(1/ ln n), the number of isolated nodes asymptotically follows a Poisson distribution with mean e c. Pishro-Nik et al. [34] also obtained such result on asymptotic Poisson distribution with condition K n /P n = ω(1/ ln n) generalized to K n /P n = Ω(1/ ln n). In this paper, we discuss the distribution of isolated nodes in WSNs employing the widely Eschenauer-Gligor key

9 Discrete Dynamics in Nature and Society 9 predistribution scheme under transmission constraint with nodes distributed either Poissonly or uniformly on a unit square S or a unit torus S T. Using the coupling technique, it is shown that the impact of the boundary effect on the number of isolated nodes vanishes small as n.we obtain that the numbers of isolated nodes in graph G(n, θ n, S) and graph G Poisson (n, θ n, S) asymptotically follow a Poisson distribution with mean e c with πr n (K n /P n)=(ln n+c)/n and K n /P n = ω(1/ ln n). In practice WSNs, K n is expected to be several orders of magnitude smaller than P n,soitoftenholdsthatk n /P n = o(1/ ln n). We believe that the following conjecture is true. Conjecture 11. Suppose that K n /P n = o(1), K n /P n = o(1/ ln n), and n nodes are uniformly (Poissonly) distributed on a unit square S with the maximum transmission radius πr n (K n /P n) = (ln n+c)/nfor some constant c. Then the distribution of the number of isolated nodes in graph G(n, θ n, S) (graph G Poisson (n, θ n, S)) converges to a Poisson distribution with mean e c as n. Connectivity in secure wireless sensoetworks under transmission constraints is another important subject. Although the significant improved conditions and results for asymptotic connectivity are presented by Krishnan et al. [4], Krzywdziński and Rybarczyk [13], Tang and Li [3], and Zhao et al. [33], we want to show that the connectivity in WSN with theegscheme(i.e.,g(n, θ n, S)) isexactlyanalogueofthe counterpartinclassicrandomgraphs. Conjecture 1. Suppose that K n /P n = o(1), K n /P n = o(1/ ln n),andπr n (K n /P n)=(ln n+c n )/n. (i) If c n,thenwithhighprobabilityg(n, θ n, S) is disconnected. (ii) If c n c, then the probability that G(n, θ n, S) is connected tends to e e c. (iii) If c n,thenwithhighprobabilityg(n, θ n, S) is connected. It would be interesting to carry out an illustrative simulation to strengthen the theoretical asymptotic results of the distribution of the number of isolated nodes and connectivity. The simulations may be carried out for small, medium, and large but not very large networks. Such results hold under condition K n /P n = o(1/ ln n), which remains an open research challenge. Competing Interests The authors declare that they have no competing interests. Acknowledgments The work was supported by National Natural Science Foundation of China (NSFC) under Grant no and the project sponsored by the Scientific Research Foundation for the Returned Overseas Scholars of the Education Ministry of China. References [1] E. N. Gilbert, Random plane networks, the Society for the Industrial and Applied Mathematics,vol.9,pp , [] L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensoetworks, in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS ), pp.41 47,ACMPress,Washington,DC,USA,November. [3] H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensoetworks, in Proceedings of the Symposium on Security and Privacy (SP 3), pp , IEEE, Berkeley, Calif, USA, May 3. [4] B. S. Krishnan, A. Ganesh, and D. Manjunath, On connectivity thresholds in superposition of random key graphs on random geometric graphs, in Proceedings of the IEEE International Symposium on Information Theory (ISIT 13), pp , Istanbul, Turkey, July 13. [5] K. Rybarczyk, Diameter, connectivity, and phase transition of the uniform random intersection graph, Discrete Mathematics, vol. 311, no. 17, pp , 11. [6] O. Yagan and A. M. Makowski, Zero-one laws for connectivity in random key graphs, IEEE Transactions on Information Theory,vol.58,no.5,pp ,1. [7] S. R. Blackburn and S. Gerke, Connectivity of the uniform random intersection graph, Discrete Mathematics,vol.39,no. 16, pp , 9. [8] M. Bloznelis, Degree and clustering coefficient in sparse random intersection graphs, The Annals of Applied Probability, vol.3,no.3,pp ,13. [9] J. Zhao, O. Yağan, and V. Gligor, k-connectivity in secure wireless sensoetworks with physical link constraints-the On/Off channel model, [1] C.-W. Yi, P.-J. Wan, K.-W. Lin, and C.-H. Huang, WSN18-5: asymptotic distribution of the number of isolated nodes in wireless ad hoc networks with unreliable nodes and links, in Proceedings of the IEEE GLOBECOM, pp.1 5,SanFrancisco, Calif, USA, November-December 6. [11] M. D. Penrose, Random Geometric Graphs, vol.5ofoxford Studies in Probability, Oxford University Press, Oxford, UK, 3. [1] P. Gupta and P. R. Kumar, Critical power for asymptotic connectivity in wireless networks, in Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming, Systems & Control: Foundations & Applications, pp , Springer, Berlin, Germany, [13] K. Krzywdziński and K. Rybarczyk, Geometric graphs with randomly deleted edges connectivity and routing protocols, in Mathematical Foundations of Computer Science 11: 36th InternationalSymposium,MFCS11,Warsaw,Poland,August 6, 11. Proceedings,vol.697ofLecture Notes in Computer Science, pp , Springer, Berlin, Germany, 11. [14] M. D. Penrose, On k-connectivity for a geometric random graph, Random Structures & Algorithms,vol.15,no.,pp , [15] P.-J. Wan and C.-W. Yi, Asymptotic critical transmission radius and critical neighboumber for k-connectivity in wireless ad hoc networks, in Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MoBiHoc 4), pp. 1 8, Tokyo, Japan, May 4.

10 1 Discrete Dynamics in Nature and Society [16] H. Dette and N. Henze, The it distribution of the largest nearest-neighbour link in the unit d-cube, Applied Probability, vol. 6, no. 1, pp. 67 8, [17] M. D. Penrose, The longest edge of the random minimal spanning tree, The Annals of Applied Probability, vol.7,no., pp ,1997. [18] P.-J. Wan and C.-W. Yi, Coverage by randomly deployed wireless sensoetworks, IEEE Transactions on Information Theory,vol.5,no.6,pp ,6. [19] P.-J. Wan and C.-W. Yi, Asymptotic critical transmission ranges for connectivity in wireless ad hoc networks with Bernoulli nodes, in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 5), pp. 19 4, New Orleans, La, USA, March 5. [] C.-W. Yi, P.-J. Wan, X.-Y. Li, and O. Frieder, Asymptotic distribution of the number of isolated nodes in wireless ad hoc networks with Bernoulli nodes, IEEE Transactions on Communications,vol.54,no.3,pp ,6. [1] H. M. Ammari and S. K. Das, Critical density for coverage and connectivity in three-dimensional wireless sensoetworks using continuum percolation, IEEE Transactions on Parallel and Distributed Systems,vol.,no.6,pp ,9. [] E. Godehardt and J. Jaworshi, Two models of random intersection graphs for classification, in Studies in Classification, Data Analysis and Knowledge Organization,pp.67 81,Springer,3. [3] E. Godehardt, J. Jaworski, and K. Rybarczyk, Random intersection graphs and classification, in Studies in Classification, Data Analysis and Knowledge Organization, pp , Springer, New York, NY, USA, 7. [4] M. Bloznelis, J. Jaworski, and K. Rybarczyk, Component evolutioninasecurewirelesssensornetwork, Networks, vol. 53,no.1,pp.19 6,9. [5] E. Godehardt, J. Jaworski, and K. Rybarczyk, Isolated vertices in random intersection graphs, in Advanced in Data Analysis, pp , Springer, Berlin, Germany, 1. [6] R. D. Pietro, L. V. Mancini, A. Mei, A. Panconesi, and J. Radhakrishnan, How to design connected sensoetworks that are provably secure, in Proceedings of the SecureComm 6, The nd IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks, Baltimore, Md, USA, August 6. [7] K. Rybarczyk, Sharp threshold functions for the random intersection graph via a coupling method, The Electronic Combinatorics,vol.18,no.1,pp.36 47,11. [8] P. Erdős and A. Rényi, On random graphs. I, Publicationes Mathematicae (Debrecen), vol. 6, pp. 9 97, [9] G. Mao and B. D. O. Anderson, Towards a better understanding of large-scale network models, IEEE/ACM Transactions on Networking,vol.,no.,pp.48 41,1. [3] O. Yağan, Performance of the Eschenauer Gligor key distribution scheme under an ON/OFF channel, IEEE Transactions on Information Theory,vol.58,no.6,pp ,1. [31]R.DiPietro,L.V.Mancini,A.Mei,A.Panconesi,andJ. Radhakrishnan, Connectivity properties of secure wireless sensoetworks, in Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 4),pp.53 58, October 4. [3] Y. Tang and Q. L. Li, Zero-one law for connectivity in superposition of random key graphs on random geometric graphs, Discrete Dynamics in Nature and Society, vol.15, Article ID 9894, 9 pages, 15. [33] J.Zhao,O.Yagan,andV.Gligor, Connectivityinsecurewireless sensoetworks under transmission constraints, in Proceedings of the 5nd Annual Allerton Conference on Communication, Control, and Computing (Allerton 14), pp ,Monticello, Ill, USA, October 14. [34] H.Pishro-Nik,K.Chan,andF.Fekri, Connectivityproperties of large-scale sensoetworks, Wireless Networks,vol.15,no.7, pp , 9. [35] X.-Y. Li, P.-J. Wan, Y. Wang, and C.-W. Yi, Fault tolerant deployment and topology control in wireless networks, in Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 3), pp , Annapolis, Md, USA, June 3. [36] R. Meester and R. Roy, Continuum Percolation, vol.119of Cambridge Tracts in Mathematics, Cambridge University Press, Cambridge, UK, [37]S.Janson,T.Luczak,andA.Rucinski,Random Graphs, John Wiley & Sons, 1. [38] A. D. Barbour, L. Holst, and S. Janson, Poisson Approximation, Oxford University Press, New York, NY, USA, 199. [39] T. Lindvall, Lectures on the Coupling Method, Dover, Mineola, NY, USA,. [4] G. R. Grimmett and D. R. Stirzaker, Probability and Random Processes, Oxford University Press, New York, NY, USA, 3rd edition, 1.

11 Advances in Operations Research Volume 14 Advances in Decision Sciences Volume 14 Applied Mathematics Algebra Volume 14 Probability and Statistics Volume 14 The Scientific World Journal Volume 14 International Differential Equations Volume 14 Volume 14 Submit your manuscripts at International Advances in Combinatorics Mathematical Physics Volume 14 Complex Analysis Volume 14 International Mathematics and Mathematical Sciences Mathematical Problems in Engineering Mathematics Volume 14 Volume 14 Volume 14 Volume 14 Discrete Mathematics Volume 14 Discrete Dynamics in Nature and Society Function Spaces Abstract and Applied Analysis Volume 14 Volume 14 Volume 14 International Stochastic Analysis Optimization Volume 14 Volume 14

Asymptotic Distribution of The Number of Isolated Nodes in Wireless Ad Hoc Networks with Unreliable Nodes and Links

Asymptotic Distribution of The Number of Isolated Nodes in Wireless Ad Hoc Networks with Unreliable Nodes and Links Asymptotic Distribution of The Number of Isolated Nodes in Wireless Ad Hoc Networs with Unreliable Nodes and Lins Chih-Wei Yi, Peng-Jun Wan, Kuo-Wei Lin and Chih-Hao Huang Department of Computer Science

More information

Designing securely connected wireless sensor networks in the presence of unreliable links

Designing securely connected wireless sensor networks in the presence of unreliable links Designing securely connected wireless sensor networks in the presence of unreliable links Osman Yağan and Armand M. Makowski Department of Electrical and Computer Engineering and the Institute for Systems

More information

A zero-one law for the existence of triangles in random key graphs

A zero-one law for the existence of triangles in random key graphs THE INSTITUTE FOR SYSTEMS RESEARCH ISR TECHNICAL REPORT 2011-11 A zero-one law for the existence of triangles in random key graphs Osman Yagan and Armand M. Makowski ISR develops, applies and teaches advanced

More information

Secure and reliable connectivity in heterogeneous wireless sensor networks

Secure and reliable connectivity in heterogeneous wireless sensor networks Secure and reliable connectivity in heterogeneous wireless sensor networks Rashad Eletreby and Osman Yağan Department of Electrical and Computer Engineering and CyLab, Carnegie Mellon University, Pittsburgh,

More information

Connectivity of inhomogeneous random key graphs intersecting inhomogeneous Erdős-Rényi graphs

Connectivity of inhomogeneous random key graphs intersecting inhomogeneous Erdős-Rényi graphs Connectivity of inhomogeneous random key graphs intersecting inhomogeneous Erdős-Rényi graphs Rashad Eletreby and Osman Yağan Department of Electrical and Computer Engineering and CyLab, Carnegie Mellon

More information

Sharp threshold functions for random intersection graphs via a coupling method.

Sharp threshold functions for random intersection graphs via a coupling method. Sharp threshold functions for random intersection graphs via a coupling method. Katarzyna Rybarczyk Faculty of Mathematics and Computer Science, Adam Mickiewicz University, 60 769 Poznań, Poland kryba@amu.edu.pl

More information

Secure, Reliable, and Resilient Design of Wireless Sensor Networks via Random Graph Modeling. Osman Yağan

Secure, Reliable, and Resilient Design of Wireless Sensor Networks via Random Graph Modeling. Osman Yağan Texas A&M University, October 20th, 2016 1 Secure, Reliable, and Resilient Design of Wireless Sensor Networks via Random Graph Modeling Osman Yağan Dept. of ECE and CyLab Carnegie Mellon University oyagan@ece.cmu.edu

More information

ONE of the main applications of wireless sensor networks

ONE of the main applications of wireless sensor networks 2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 Coverage by Romly Deployed Wireless Sensor Networks Peng-Jun Wan, Member, IEEE, Chih-Wei Yi, Member, IEEE Abstract One of the main

More information

Asymptotic Distribution of The Number of Isolated Nodes in Wireless Ad Hoc Networks with Bernoulli Nodes

Asymptotic Distribution of The Number of Isolated Nodes in Wireless Ad Hoc Networks with Bernoulli Nodes Asymptotic Distribution of The Number of Isolated Nodes in Wireless Ad Hoc Networs with Bernoulli Nodes Chih-Wei Yi Peng-Jun Wan Xiang-Yang Li Ophir Frieder Department of Computer cience, Illinois Institute

More information

Robust Wireless Ad Hoc Networks

Robust Wireless Ad Hoc Networks Robust Wireless Ad Hoc Networs Xiang-Yang Li Yu Wang Peng-Jun Wan Chih-Wei Yi Ophir Frieder Abstract We consider a large-scale of wireless ad hoc networs whose nodes are distributed randomly in a two-dimensional

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

Adventures in random graphs: Models, structures and algorithms

Adventures in random graphs: Models, structures and algorithms BCAM January 2011 1 Adventures in random graphs: Models, structures and algorithms Armand M. Makowski ECE & ISR/HyNet University of Maryland at College Park armand@isr.umd.edu BCAM January 2011 2 Complex

More information

A Note on Interference in Random Networks

A Note on Interference in Random Networks CCCG 2012, Charlottetown, P.E.I., August 8 10, 2012 A Note on Interference in Random Networks Luc Devroye Pat Morin Abstract The (maximum receiver-centric) interference of a geometric graph (von Rickenbach

More information

Analysis of Finite Unreliable Sensor Grids

Analysis of Finite Unreliable Sensor Grids Analysis of Finite Unreliable Sensor Grids Hossein Pishro-Nik Department of Electrical and Computer Engineering University of Massachusetts Amherst, MA 3-9292 Email:pishro@ecs.umass.edu Abstract Asymptotic

More information

Fault Tolerant Deployment and Topology Control in Wireless Networks

Fault Tolerant Deployment and Topology Control in Wireless Networks Fault Tolerant Deployment and Topology Control in Wireless Networks Xiang-Yang Li Peng-Jun Wan Yu Wang Chih-Wei Yi Dept. of Computer Science, Illinois Institute of Technology W. 3st Street, Chicago, IL

More information

Random Geometric Graphs.

Random Geometric Graphs. Random Geometric Graphs. Josep Díaz Random Geometric Graphs Random Euclidean Graphs, Random Proximity Graphs, Random Geometric Graphs. Random Euclidean Graphs Choose a sequence V = {x i } n i=1 of independent

More information

A Tractable Framework for Exact Probability. of Node Isolation and Minimum Node Degree. Distribution in Finite Multi-hop Networks

A Tractable Framework for Exact Probability. of Node Isolation and Minimum Node Degree. Distribution in Finite Multi-hop Networks A Tractable Framework for Exact Probability of Node Isolation and Minimum Node Degree Distribution in Finite Multi-hop Networks arxiv:22.283v3 [cs.it] 29 Nov 203 Zubair Khalid, Member, IEEE, Salman Durrani,

More information

Research Article Merrifield-Simmons Index in Random Phenylene Chains and Random Hexagon Chains

Research Article Merrifield-Simmons Index in Random Phenylene Chains and Random Hexagon Chains Discrete Dynamics in Nature and Society Volume 015, Article ID 56896, 7 pages http://dx.doi.org/10.1155/015/56896 Research Article Merrifield-Simmons Index in Random Phenylene Chains and Random Hexagon

More information

On the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone

On the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone On the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone Xiaodong Hu 1, Evgeniy Grechnikov 2 1 Department of Mathematics, Shandong University, Jinan 251, China. 2 Department

More information

Efficient routing in Poisson small-world networks

Efficient routing in Poisson small-world networks Efficient routing in Poisson small-world networks M. Draief and A. Ganesh Abstract In recent work, Jon Kleinberg considered a small-world network model consisting of a d-dimensional lattice augmented with

More information

Connectivity of Wireless Sensor Networks with Constant Density

Connectivity of Wireless Sensor Networks with Constant Density Connectivity of Wireless Sensor Networks with Constant Density Sarah Carruthers and Valerie King University of Victoria, Victoria, BC, Canada Abstract. We consider a wireless sensor network in which each

More information

Asymptotic normality of global clustering coefficient of uniform random intersection graph

Asymptotic normality of global clustering coefficient of uniform random intersection graph Asymptotic normality of global clustering coefficient of uniform random intersection graph Mindaugas Bloznelis joint work with Jerzy Jaworski Vilnius University, Lithuania http://wwwmifvult/ bloznelis

More information

Phase Transitions in Combinatorial Structures

Phase Transitions in Combinatorial Structures Phase Transitions in Combinatorial Structures Geometric Random Graphs Dr. Béla Bollobás University of Memphis 1 Subcontractors and Collaborators Subcontractors -None Collaborators Paul Balister József

More information

Combinatorial Rigidity and the Molecular Conjecture

Combinatorial Rigidity and the Molecular Conjecture Page 1 of 65 Combinatorial Rigidity and the Molecular Conjecture Brigitte Servatius Worcester Polytechnic Institute The Proof of the Product Rule To derivate a product as defined The diff rence quotient

More information

Research Article The Dirichlet Problem on the Upper Half-Space

Research Article The Dirichlet Problem on the Upper Half-Space Abstract and Applied Analysis Volume 2012, Article ID 203096, 5 pages doi:10.1155/2012/203096 Research Article The Dirichlet Problem on the Upper Half-Space Jinjin Huang 1 and Lei Qiao 2 1 Department of

More information

On the Quality of Wireless Network Connectivity

On the Quality of Wireless Network Connectivity Globecom 2012 - Ad Hoc and Sensor Networking Symposium On the Quality of Wireless Network Connectivity Soura Dasgupta Department of Electrical and Computer Engineering The University of Iowa Guoqiang Mao

More information

Fault Tolerant Deployment and Topology Control in Wireless Ad Hoc Networks

Fault Tolerant Deployment and Topology Control in Wireless Ad Hoc Networks Fault Tolerant Deployment and Topology Control in Wireless Ad Hoc Networks Xiang-Yang Li Λ Peng-Jun Wan Λ Yu Wang Λ Chih-Wei Yi Λ Λ Department of Computer Science, Illinois Institute of Technology, W.

More information

On the Entropy of Sums of Bernoulli Random Variables via the Chen-Stein Method

On the Entropy of Sums of Bernoulli Random Variables via the Chen-Stein Method On the Entropy of Sums of Bernoulli Random Variables via the Chen-Stein Method Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel ETH, Zurich,

More information

Equivalence of the random intersection graph and G(n, p)

Equivalence of the random intersection graph and G(n, p) Equivalence of the random intersection graph and Gn, p arxiv:0910.5311v1 [math.co] 28 Oct 2009 Katarzyna Rybarczyk Faculty of Mathematics and Computer Science, Adam Mickiewicz University, 60 769 Poznań,

More information

Research Article Opinion Impact Models and Opinion Consensus Methods in Ad Hoc Tactical Social Networks

Research Article Opinion Impact Models and Opinion Consensus Methods in Ad Hoc Tactical Social Networks Discrete Dynamics in ature and Society Volume 203, Article ID 758079, 6 pages http://dx.doi.org/0.55/203/758079 Research Article Opinion Impact Models and Opinion Consensus Methods in Ad Hoc Tactical Social

More information

Zero One Laws for Connectivity in Random Key Graphs

Zero One Laws for Connectivity in Random Key Graphs IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 5, MAY 2012 2983 Zero One Laws for Connectivity in Rom Key Graphs Osman Yağan, Student Member, IEEE, Arm M. Makowski, Fellow, IEEE Abstract The rom

More information

Research Article Product of Extended Cesàro Operator and Composition Operator from Lipschitz Space to F p, q, s Space on the Unit Ball

Research Article Product of Extended Cesàro Operator and Composition Operator from Lipschitz Space to F p, q, s Space on the Unit Ball Abstract and Applied Analysis Volume 2011, Article ID 152635, 9 pages doi:10.1155/2011/152635 Research Article Product of Extended Cesàro Operator and Composition Operator from Lipschitz Space to F p,

More information

Recent Progress in Complex Network Analysis. Properties of Random Intersection Graphs

Recent Progress in Complex Network Analysis. Properties of Random Intersection Graphs Recent Progress in Complex Network Analysis. Properties of Random Intersection Graphs Mindaugas Bloznelis, Erhard Godehardt, Jerzy Jaworski, Valentas Kurauskas, Katarzyna Rybarczyk Adam Mickiewicz University,

More information

Research Article An Optimized Grey GM(2,1) Model and Forecasting of Highway Subgrade Settlement

Research Article An Optimized Grey GM(2,1) Model and Forecasting of Highway Subgrade Settlement Mathematical Problems in Engineering Volume 015, Article ID 606707, 6 pages http://dx.doi.org/10.1155/015/606707 Research Article An Optimized Grey GM(,1) Model and Forecasting of Highway Subgrade Settlement

More information

Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components

Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components Applied Mathematics Volume 202, Article ID 689820, 3 pages doi:0.55/202/689820 Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components

More information

Research Article The Solution Set Characterization and Error Bound for the Extended Mixed Linear Complementarity Problem

Research Article The Solution Set Characterization and Error Bound for the Extended Mixed Linear Complementarity Problem Journal of Applied Mathematics Volume 2012, Article ID 219478, 15 pages doi:10.1155/2012/219478 Research Article The Solution Set Characterization and Error Bound for the Extended Mixed Linear Complementarity

More information

Continuum percolation with holes

Continuum percolation with holes Continuum percolation with holes A. Sarkar a,, M. Haenggi b a Western Washington University, Bellingham WA 98225, USA b University of Notre Dame, Notre Dame IN 46556, USA Abstract We analyze a mathematical

More information

Upper Bounds on Expected Hitting Times in Mostly-Covered Delay-Tolerant Networks

Upper Bounds on Expected Hitting Times in Mostly-Covered Delay-Tolerant Networks Upper Bounds on Expected Hitting Times in Mostly-Covered Delay-Tolerant Networks Max F. Brugger, Kyle Bradford, Samina Ehsan, Bechir Hamdaoui, Yevgeniy Kovchegov Oregon State University, Corvallis, OR

More information

On the distance signless Laplacian spectral radius of graphs and digraphs

On the distance signless Laplacian spectral radius of graphs and digraphs Electronic Journal of Linear Algebra Volume 3 Volume 3 (017) Article 3 017 On the distance signless Laplacian spectral radius of graphs and digraphs Dan Li Xinjiang University,Urumqi, ldxjedu@163.com Guoping

More information

Research Article An Iterative Algorithm for the Split Equality and Multiple-Sets Split Equality Problem

Research Article An Iterative Algorithm for the Split Equality and Multiple-Sets Split Equality Problem Abstract and Applied Analysis, Article ID 60813, 5 pages http://dx.doi.org/10.1155/014/60813 Research Article An Iterative Algorithm for the Split Equality and Multiple-Sets Split Equality Problem Luoyi

More information

A Capacity Upper Bound for Large Wireless Networks with Generally Distributed Nodes

A Capacity Upper Bound for Large Wireless Networks with Generally Distributed Nodes Capacity Upper Bound for Large Wireless Networks with Generally Distributed Nodes Guoqiang Mao, Zihuai Lin School of Electrical and Information Engineering The University of Sydney Email: {guoqiang.mao,

More information

The expansion of random regular graphs

The expansion of random regular graphs The expansion of random regular graphs David Ellis Introduction Our aim is now to show that for any d 3, almost all d-regular graphs on {1, 2,..., n} have edge-expansion ratio at least c d d (if nd is

More information

Research Article The Zeros of Orthogonal Polynomials for Jacobi-Exponential Weights

Research Article The Zeros of Orthogonal Polynomials for Jacobi-Exponential Weights bstract and pplied nalysis Volume 2012, rticle ID 386359, 17 pages doi:10.1155/2012/386359 Research rticle The Zeros of Orthogonal Polynomials for Jacobi-Exponential Weights Rong Liu and Ying Guang Shi

More information

Random Graphs. EECS 126 (UC Berkeley) Spring 2019

Random Graphs. EECS 126 (UC Berkeley) Spring 2019 Random Graphs EECS 126 (UC Bereley) Spring 2019 1 Introduction In this note, we will briefly introduce the subject of random graphs, also nown as Erdös-Rényi random graphs. Given a positive integer n and

More information

A simple branching process approach to the phase transition in G n,p

A simple branching process approach to the phase transition in G n,p A simple branching process approach to the phase transition in G n,p Béla Bollobás Department of Pure Mathematics and Mathematical Statistics Wilberforce Road, Cambridge CB3 0WB, UK b.bollobas@dpmms.cam.ac.uk

More information

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo 3rd Biennial Canadian Discrete

More information

Research Article Extended Precise Large Deviations of Random Sums in the Presence of END Structure and Consistent Variation

Research Article Extended Precise Large Deviations of Random Sums in the Presence of END Structure and Consistent Variation Applied Mathematics Volume 2012, Article ID 436531, 12 pages doi:10.1155/2012/436531 Research Article Extended Precise Large Deviations of Random Sums in the Presence of END Structure and Consistent Variation

More information

Research Article A New Roper-Suffridge Extension Operator on a Reinhardt Domain

Research Article A New Roper-Suffridge Extension Operator on a Reinhardt Domain Abstract and Applied Analysis Volume 2011, Article ID 865496, 14 pages doi:10.1155/2011/865496 Research Article A New Roper-Suffridge Extension Operator on a Reinhardt Domain Jianfei Wang and Cailing Gao

More information

Network models: random graphs

Network models: random graphs Network models: random graphs Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics Structural Analysis

More information

On the Average Pairwise Connectivity of Wireless Multihop Networks

On the Average Pairwise Connectivity of Wireless Multihop Networks On the Average Pairwise Connectivity of Wireless Multihop Networks Fangting Sun and Mark Shayman Department of Electrical and Computer Engineering University of Maryland, College Park, MD 2742 {ftsun,

More information

Random Graphs. 7.1 Introduction

Random Graphs. 7.1 Introduction 7 Random Graphs 7.1 Introduction The theory of random graphs began in the late 1950s with the seminal paper by Erdös and Rényi [?]. In contrast to percolation theory, which emerged from efforts to model

More information

Research Article A New Fractional Integral Inequality with Singularity and Its Application

Research Article A New Fractional Integral Inequality with Singularity and Its Application Abstract and Applied Analysis Volume 212, Article ID 93798, 12 pages doi:1.1155/212/93798 Research Article A New Fractional Integral Inequality with Singularity and Its Application Qiong-Xiang Kong 1 and

More information

Correspondence should be addressed to Serap Bulut;

Correspondence should be addressed to Serap Bulut; The Scientific World Journal Volume 201, Article ID 17109, 6 pages http://dx.doi.org/10.1155/201/17109 Research Article Coefficient Estimates for Initial Taylor-Maclaurin Coefficients for a Subclass of

More information

Research Article Global Existence and Boundedness of Solutions to a Second-Order Nonlinear Differential System

Research Article Global Existence and Boundedness of Solutions to a Second-Order Nonlinear Differential System Applied Mathematics Volume 212, Article ID 63783, 12 pages doi:1.1155/212/63783 Research Article Global Existence and Boundedness of Solutions to a Second-Order Nonlinear Differential System Changjian

More information

Random Geometric Graphs

Random Geometric Graphs Random Geometric Graphs Mathew D. Penrose University of Bath, UK SAMBa Symposium (Talk 2) University of Bath November 2014 1 MODELS of RANDOM GRAPHS Erdos-Renyi G(n, p): start with the complete n-graph,

More information

Course Notes. Part IV. Probabilistic Combinatorics. Algorithms

Course Notes. Part IV. Probabilistic Combinatorics. Algorithms Course Notes Part IV Probabilistic Combinatorics and Algorithms J. A. Verstraete Department of Mathematics University of California San Diego 9500 Gilman Drive La Jolla California 92037-0112 jacques@ucsd.edu

More information

Research Article On the Plane Geometry with Generalized Absolute Value Metric

Research Article On the Plane Geometry with Generalized Absolute Value Metric Mathematical Problems in Engineering Volume 2008, Article ID 673275, 8 pages doi:10.1155/2008/673275 Research Article On the Plane Geometry with Generalized Absolute Value Metric A. Bayar, S. Ekmekçi,

More information

Notes 6 : First and second moment methods

Notes 6 : First and second moment methods Notes 6 : First and second moment methods Math 733-734: Theory of Probability Lecturer: Sebastien Roch References: [Roc, Sections 2.1-2.3]. Recall: THM 6.1 (Markov s inequality) Let X be a non-negative

More information

Research Article A Nice Separation of Some Seiffert-Type Means by Power Means

Research Article A Nice Separation of Some Seiffert-Type Means by Power Means International Mathematics and Mathematical Sciences Volume 2012, Article ID 40692, 6 pages doi:10.1155/2012/40692 Research Article A Nice Separation of Some Seiffert-Type Means by Power Means Iulia Costin

More information

Research Article Bessel Equation in the Semiunbounded Interval x [x 0, ]: Solving in the Neighbourhood of an Irregular Singular Point

Research Article Bessel Equation in the Semiunbounded Interval x [x 0, ]: Solving in the Neighbourhood of an Irregular Singular Point International Mathematics and Mathematical Sciences Volume 2016, Article ID 6826482, 7 pages http://dx.doi.org/10.1155/2016/6826482 Research Article Bessel Equation in the Semiunbounded Interval x [x 0,

More information

Failure-Resilient Ad Hoc and Sensor Networks in a Shadow Fading Environment

Failure-Resilient Ad Hoc and Sensor Networks in a Shadow Fading Environment Failure-Resilient Ad Hoc and Sensor Networks in a Shadow Fading Environment Christian Bettstetter DoCoMo Euro-Labs, Future Networking Lab, Munich, Germany lastname at docomolab-euro.com Abstract This paper

More information

Random Geometric Graphs

Random Geometric Graphs Random Geometric Graphs Mathew D. Penrose University of Bath, UK Networks: stochastic models for populations and epidemics ICMS, Edinburgh September 2011 1 MODELS of RANDOM GRAPHS Erdos-Renyi G(n, p):

More information

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random Susceptible-Infective-Removed Epidemics and Erdős-Rényi random graphs MSR-Inria Joint Centre October 13, 2015 SIR epidemics: the Reed-Frost model Individuals i [n] when infected, attempt to infect all

More information

Research Article Multiple-Decision Procedures for Testing the Homogeneity of Mean for k Exponential Distributions

Research Article Multiple-Decision Procedures for Testing the Homogeneity of Mean for k Exponential Distributions Discrete Dynamics in Nature and Society, Article ID 70074, 5 pages http://dx.doi.org/0.55/204/70074 Research Article Multiple-Decision Procedures for Testing the Homogeneity of Mean for Exponential Distributions

More information

Research Article Translative Packing of Unit Squares into Squares

Research Article Translative Packing of Unit Squares into Squares International Mathematics and Mathematical Sciences Volume 01, Article ID 61301, 7 pages doi:10.1155/01/61301 Research Article Translative Packing of Unit Squares into Squares Janusz Januszewski Institute

More information

Research Article A New Class of Meromorphic Functions Associated with Spirallike Functions

Research Article A New Class of Meromorphic Functions Associated with Spirallike Functions Applied Mathematics Volume 202, Article ID 49497, 2 pages doi:0.55/202/49497 Research Article A New Class of Meromorphic Functions Associated with Spirallike Functions Lei Shi, Zhi-Gang Wang, and Jing-Ping

More information

Probabilistic model for Intrusion Detection in Wireless Sensor Network

Probabilistic model for Intrusion Detection in Wireless Sensor Network Probabilistic model for Intrusion Detection in Wireless Sensor Network Maduri Chopde, Kimi Ramteke and Satish Kamble Department of Computer Science PICT, Pune Pune University, India madhurichopde@gmail.com,

More information

arxiv: v1 [math.st] 1 Nov 2017

arxiv: v1 [math.st] 1 Nov 2017 ASSESSING THE RELIABILITY POLYNOMIAL BASED ON PERCOLATION THEORY arxiv:1711.00303v1 [math.st] 1 Nov 2017 SAJADI, FARKHONDEH A. Department of Statistics, University of Isfahan, Isfahan 81744,Iran; f.sajadi@sci.ui.ac.ir

More information

A New Random Graph Model with Self-Optimizing Nodes: Connectivity and Diameter

A New Random Graph Model with Self-Optimizing Nodes: Connectivity and Diameter A New Random Graph Model with Self-Optimizing Nodes: Connectivity and Diameter Richard J. La and Maya Kabkab Abstract We introduce a new random graph model. In our model, n, n 2, vertices choose a subset

More information

Research Article Almost Sure Central Limit Theorem of Sample Quantiles

Research Article Almost Sure Central Limit Theorem of Sample Quantiles Advances in Decision Sciences Volume 202, Article ID 67942, 7 pages doi:0.55/202/67942 Research Article Almost Sure Central Limit Theorem of Sample Quantiles Yu Miao, Shoufang Xu, 2 and Ang Peng 3 College

More information

Research Article Parametric Evaluations of the Rogers-Ramanujan Continued Fraction

Research Article Parametric Evaluations of the Rogers-Ramanujan Continued Fraction International Mathematics and Mathematical Sciences Volume 011, Article ID 940839, 11 pages doi:10.1155/011/940839 Research Article Parametric Evaluations of the Rogers-Ramanujan Continued Fraction Nikos

More information

Research Article A Note on the Central Limit Theorems for Dependent Random Variables

Research Article A Note on the Central Limit Theorems for Dependent Random Variables International Scholarly Research Network ISRN Probability and Statistics Volume 22, Article ID 92427, pages doi:.542/22/92427 Research Article A Note on the Central Limit Theorems for Dependent Random

More information

Research Article Circle-Uniqueness of Pythagorean Orthogonality in Normed Linear Spaces

Research Article Circle-Uniqueness of Pythagorean Orthogonality in Normed Linear Spaces Function Spaces, Article ID 634842, 4 pages http://dx.doi.org/10.1155/2014/634842 Research Article Circle-Uniqueness of Pythagorean Orthogonality in Normed Linear Spaces Senlin Wu, Xinjian Dong, and Dan

More information

Research Article On the Modified q-bernoulli Numbers of Higher Order with Weight

Research Article On the Modified q-bernoulli Numbers of Higher Order with Weight Abstract and Applied Analysis Volume 202, Article ID 948050, 6 pages doi:0.55/202/948050 Research Article On the Modified -Bernoulli Numbers of Higher Order with Weight T. Kim, J. Choi, 2 Y.-H. Kim, 2

More information

Research Article Unicity of Entire Functions concerning Shifts and Difference Operators

Research Article Unicity of Entire Functions concerning Shifts and Difference Operators Abstract and Applied Analysis Volume 204, Article ID 38090, 5 pages http://dx.doi.org/0.55/204/38090 Research Article Unicity of Entire Functions concerning Shifts and Difference Operators Dan Liu, Degui

More information

EFFICIENT ROUTEING IN POISSON SMALL-WORLD NETWORKS

EFFICIENT ROUTEING IN POISSON SMALL-WORLD NETWORKS J. Appl. Prob. 43, 678 686 (2006) Printed in Israel Applied Probability Trust 2006 EFFICIENT ROUTEING IN POISSON SMALL-WORLD NETWORKS M. DRAIEF, University of Cambridge A. GANESH, Microsoft Research Abstract

More information

Note on the structure of Kruskal s Algorithm

Note on the structure of Kruskal s Algorithm Note on the structure of Kruskal s Algorithm Nicolas Broutin Luc Devroye Erin McLeish November 15, 2007 Abstract We study the merging process when Kruskal s algorithm is run with random graphs as inputs.

More information

Coloring Geographical Threshold Graphs

Coloring Geographical Threshold Graphs Discrete Mathematics and Theoretical Computer Science DMTCS vol. 12:3, 2010, 103 114 Coloring Geographical Threshold Graphs Milan Bradonjić 1 and Tobias Müller 2 and Allon G. Percus 3S 1 Theoretical Division,

More information

Research Article Approximation of Analytic Functions by Bessel s Functions of Fractional Order

Research Article Approximation of Analytic Functions by Bessel s Functions of Fractional Order Abstract and Applied Analysis Volume 20, Article ID 923269, 3 pages doi:0.55/20/923269 Research Article Approximation of Analytic Functions by Bessel s Functions of Fractional Order Soon-Mo Jung Mathematics

More information

On the mean connected induced subgraph order of cographs

On the mean connected induced subgraph order of cographs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,

More information

Research Article On Decomposable Measures Induced by Metrics

Research Article On Decomposable Measures Induced by Metrics Applied Mathematics Volume 2012, Article ID 701206, 8 pages doi:10.1155/2012/701206 Research Article On Decomposable Measures Induced by Metrics Dong Qiu 1 and Weiquan Zhang 2 1 College of Mathematics

More information

Research Article k-tuple Total Domination in Complementary Prisms

Research Article k-tuple Total Domination in Complementary Prisms International Scholarly Research Network ISRN Discrete Mathematics Volume 2011, Article ID 68127, 13 pages doi:10.502/2011/68127 Research Article k-tuple Total Domination in Complementary Prisms Adel P.

More information

Research Article New Oscillation Criteria for Second-Order Neutral Delay Differential Equations with Positive and Negative Coefficients

Research Article New Oscillation Criteria for Second-Order Neutral Delay Differential Equations with Positive and Negative Coefficients Abstract and Applied Analysis Volume 2010, Article ID 564068, 11 pages doi:10.1155/2010/564068 Research Article New Oscillation Criteria for Second-Order Neutral Delay Differential Equations with Positive

More information

Computing and Communicating Functions over Sensor Networks

Computing and Communicating Functions over Sensor Networks Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]

More information

Research Article Fast Constructions of Quantum Codes Based on Residues Pauli Block Matrices

Research Article Fast Constructions of Quantum Codes Based on Residues Pauli Block Matrices Advances in Mathematical Physics Volume 2010, Article ID 469124, 12 pages doi:10.1155/2010/469124 Research Article Fast Constructions of Quantum Codes Based on Residues Pauli Block Matrices Ying Guo, Guihu

More information

Bipartite decomposition of random graphs

Bipartite decomposition of random graphs Bipartite decomposition of random graphs Noga Alon Abstract For a graph G = (V, E, let τ(g denote the minimum number of pairwise edge disjoint complete bipartite subgraphs of G so that each edge of G belongs

More information

Research Article On the Idempotent Solutions of a Kind of Operator Equations

Research Article On the Idempotent Solutions of a Kind of Operator Equations International Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 84665, pages doi:0.540/0/84665 Research Article On the Idempotent Solutions of a Kind of Operator Equations Chun Yuan

More information

Research Article Existence and Uniqueness of Homoclinic Solution for a Class of Nonlinear Second-Order Differential Equations

Research Article Existence and Uniqueness of Homoclinic Solution for a Class of Nonlinear Second-Order Differential Equations Applied Mathematics Volume 2012, Article ID 615303, 13 pages doi:10.1155/2012/615303 Research Article Existence and Uniqueness of Homoclinic Solution for a Class of Nonlinear Second-Order Differential

More information

Research Article The Entanglement of Independent Quantum Systems

Research Article The Entanglement of Independent Quantum Systems Advances in Mathematical Physics Volume 2012, Article ID 104856, 6 pages doi:10.1155/2012/104856 Research Article The Entanglement of Independent Quantum Systems Shuilin Jin 1 and Li Xu 2 1 Department

More information

Research Article Solvability of a Class of Integral Inclusions

Research Article Solvability of a Class of Integral Inclusions Abstract and Applied Analysis Volume 212, Article ID 21327, 12 pages doi:1.1155/212/21327 Research Article Solvability of a Class of Integral Inclusions Ying Chen and Shihuang Hong Institute of Applied

More information

Research Article On the Security of a Novel Probabilistic Signature Based on Bilinear Square Diffie-Hellman Problem and Its Extension

Research Article On the Security of a Novel Probabilistic Signature Based on Bilinear Square Diffie-Hellman Problem and Its Extension e Scientific World Journal, Article ID 345686, 4 pages http://dx.doi.org/10.1155/2014/345686 Research Article On the Security of a Novel Probabilistic Signature Based on Bilinear Square Diffie-Hellman

More information

Research Article Classification Formula and Generation Algorithm of Cycle Decomposition Expression for Dihedral Groups

Research Article Classification Formula and Generation Algorithm of Cycle Decomposition Expression for Dihedral Groups Abstract and Applied Analysis Volume 013, Article ID 176598, 6 pages http://dx.doi.org/10.1155/013/176598 Research Article Classification Formula and Generation Algorithm of Cycle Decomposition Expression

More information

Finding Hamilton cycles in random intersection graphs

Finding Hamilton cycles in random intersection graphs Discrete Mathematics and Theoretical Computer Science DMTCS vol. 20:1, 2018, #8 Finding Hamilton cycles in random intersection graphs arxiv:1702.03667v3 [math.co] 1 Mar 2018 Katarzyna Rybarczyk Adam Mickiewicz

More information

A Characterization of the Cactus Graphs with Equal Domination and Connected Domination Numbers

A Characterization of the Cactus Graphs with Equal Domination and Connected Domination Numbers International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 7, 275-281 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.7932 A Characterization of the Cactus Graphs with

More information

Research Article Special Approach to Near Set Theory

Research Article Special Approach to Near Set Theory Mathematical Problems in Engineering Volume 2011, Article ID 168501, 10 pages doi:10.1155/2011/168501 Research Article Special Approach to Near Set Theory M. E. Abd El-Monsef, 1 H. M. Abu-Donia, 2 and

More information

Research Article Minor Prime Factorization for n-d Polynomial Matrices over Arbitrary Coefficient Field

Research Article Minor Prime Factorization for n-d Polynomial Matrices over Arbitrary Coefficient Field Complexity, Article ID 6235649, 9 pages https://doi.org/10.1155/2018/6235649 Research Article Minor Prime Factorization for n-d Polynomial Matrices over Arbitrary Coefficient Field Jinwang Liu, Dongmei

More information

Research Article Propagation Characteristics of Oblique Incident Terahertz Wave in Nonuniform Dusty Plasma

Research Article Propagation Characteristics of Oblique Incident Terahertz Wave in Nonuniform Dusty Plasma Antennas and Propagation Volume 216, Article ID 945473, 6 pages http://dx.doi.org/1.1155/216/945473 Research Article Propagation Characteristics of Oblique Incident Terahert Wave in Nonuniform Dusty Plasma

More information

The concentration of the chromatic number of random graphs

The concentration of the chromatic number of random graphs The concentration of the chromatic number of random graphs Noga Alon Michael Krivelevich Abstract We prove that for every constant δ > 0 the chromatic number of the random graph G(n, p) with p = n 1/2

More information

Research Article On Multivalued Nonexpansive Mappings in R-Trees

Research Article On Multivalued Nonexpansive Mappings in R-Trees Applied Mathematics Volume 2012, Article ID 629149, 13 pages doi:10.1155/2012/629149 Research Article On Multivalued Nonexpansive Mappings in R-Trees K. Samanmit and B. Panyanak Department of Mathematics,

More information

Research Article Partial Pole Placement in LMI Region

Research Article Partial Pole Placement in LMI Region Control Science and Engineering Article ID 84128 5 pages http://dxdoiorg/11155/214/84128 Research Article Partial Pole Placement in LMI Region Liuli Ou 1 Shaobo Han 2 Yongji Wang 1 Shuai Dong 1 and Lei

More information